Category: GSNA

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your officeconsists of one server, seventy client computers, and one print device. You raise a request for printing aconfidential page. After 30 minutes, you find that your print request job is not processed and is at the seventhposition in the […]

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want torun a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task? A. swapon B. tune2fs C. swapoff […]

You work as a Network Administrator for Infonet Inc. The company’s network has an FTP server. You want tosecure the server so that only authorized users can access it. What will you do to accomplish this? A. Disable anonymous authentication. B. Stop the FTP service on the server. C. Disable the network adapter on the […]

Which of the following statements about a perimeter network are true? (Choose three) A. It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall. B. It has a connection to a private network through an external firewall and a connection to an internal […]

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based onWindows Server 2003. One day, while analyzing the network security, he receives an error message thatKernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation? A. He should download the latest patches […]

In addition to denying and granting access, what other services does a firewall support? A. Network Access Translation (NAT) B. Secondary connections C. Control Internet access based on keyword restriction D. Data caching Explanation:A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet againstunauthorized […]

Which of the following are the goals of risk management? (Choose three) A. Identifying the risk B. Assessing the impact of potential threats C. Finding an economic balance between the impact of the risk and the cost of the countermeasure D. Identifying the accused Explanation:There are three goals of risk management as follows: Identifying the […]

Ryan wants to create an ad hoc wireless network so that he can share some important files with anotheremployee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?(Choose two) A. WPA2 -EAP B. WPA-PSK C. WEP D. WPA-EAP Explanation:Ryan can either choose WEP […]

Which of the following mechanisms is closely related to authorization? A. Sending secret data such as credit card information. B. Allowing access to a particular resource. C. Verifying username and password. D. Sending data so that no one can alter it on the way. Explanation:Authorization is a process that verifies whether a user has permission […]

An auditor assesses the database environment before beginning the audit. This includes various key tasks thatshould be performed by an auditor to identify and prioritize the users, data, activities, and applications to bemonitored. Which of the following tasks need to be performed by the auditor manually? A. Classifying data risk within the database systems B. […]